TWI450566B - Methods for establishing voice communication - Google Patents

Methods for establishing voice communication Download PDF

Info

Publication number
TWI450566B
TWI450566B TW096132783A TW96132783A TWI450566B TW I450566 B TWI450566 B TW I450566B TW 096132783 A TW096132783 A TW 096132783A TW 96132783 A TW96132783 A TW 96132783A TW I450566 B TWI450566 B TW I450566B
Authority
TW
Taiwan
Prior art keywords
phone number
telephone number
user
abuse
period
Prior art date
Application number
TW096132783A
Other languages
Chinese (zh)
Other versions
TW200824415A (en
Inventor
Marcus Larner
Stein E Dolan
Gary E Gallaher
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of TW200824415A publication Critical patent/TW200824415A/en
Application granted granted Critical
Publication of TWI450566B publication Critical patent/TWI450566B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/06Simultaneous speech and data transmission, e.g. telegraphic transmission over the same conductors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/0024Services and arrangements where telephone services are combined with data services
    • H04M7/003Click to dial services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1076Screening of IP real time communications, e.g. spam over Internet telephony [SPIT]
    • H04L65/1079Screening of IP real time communications, e.g. spam over Internet telephony [SPIT] of unsolicited session attempts, e.g. SPIT
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42195Arrangements for calling back a calling subscriber
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6027Fraud preventions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephone Function (AREA)

Description

用於建立語音通訊的方法Method for establishing voice communication

本發明係有關於按通話數付費服務的通話濫用避免。The present invention relates to call abuse avoidance for pay-per-call services.

全球資訊網使得消費者及零售商能更輕易地彼此聯繫。消費者可利用搜尋引擎及關鍵字搜尋來找出所需貨物及服務之零售商。網站及其他線上研究工具允許消費者過濾該結果以找出有興趣之零售商。零售商可利用贊助之搜尋或購買置入性行銷以便讓目標消費者能夠辨識其產品及服務。The World Wide Web makes it easier for consumers and retailers to connect with each other. Consumers can use search engines and keyword searches to find the retailers of the goods and services they need. Websites and other online research tools allow consumers to filter the results to identify interested retailers. Retailers can use sponsored searches or purchase-based marketing to enable target consumers to identify their products and services.

儘管可在網際網路上取得大量之資訊,許多消費者仍偏好在零售商之營業處直接進行對話以便確認細節或得到額外資訊並完成一交易。雖然傳統公眾交換電話網路(PSTN)仍為通訊之一種主要模式,網際網路語音通訊協定(VoIP)之運用也日益普及。Despite the vast amount of information available on the Internet, many consumers prefer to have a direct conversation at the retailer's premises to confirm details or get additional information and complete a transaction. While the traditional Public Switched Telephone Network (PSTN) is still a major mode of communication, the use of Voice over Internet Protocol (VoIP) is becoming increasingly popular.

VoIP技術允許使用者利用一寬頻網際網路連線來取代PSTN中之一般電話線路以撥打電話。利用VoIP之某些服務可僅允許使用者利用VoIP和其他人通話。然而,許多服務亦允許使用者和具有一電話號碼之任何人通話,包括區域、長途、行動、及國際電話號碼。雖然某些服務僅可用於一電腦或一特別VoIP電話中,其他服務允許透過一配接器來運用一傳統電話。VoIP technology allows users to use a broadband Internet connection to replace the general telephone line in the PSTN to make calls. Some services that utilize VoIP can only allow users to use VoIP to talk to other people. However, many services also allow users to talk to anyone with a phone number, including regional, long distance, mobile, and international phone numbers. While some services are only available for one computer or a special VoIP phone, other services allow the use of a conventional phone through an adapter.

為了鼓勵運用VoIP,服務提供者已試圖尋找能夠讓VoIP在使用上更方便且有效率之方法。舉例而言,某些VoIP提供者提出之科技能夠識別網際網路內容中之可能電話號碼,其能將一網頁中找到之電話號碼加以醒目提醒並關聯一超鏈結其允許一使用者對醒目提醒之號碼啟動一通話。To encourage the use of VoIP, service providers have tried to find ways to make VoIP more convenient and efficient. For example, some VoIP providers propose technologies that identify possible phone numbers in Internet content, which can alert a phone number found in a web page and associate it with a hyperlink that allows a user to be eye-catching The reminder number initiates a call.

線上廣告也已發展到可運用VoIP。舉例而言,廣告主能夠提供一零售商電話號碼之一超鏈結,且鍵擊該鏈結能夠以一種通稱為隨點即通(C2C)之模型對零售商啟動一通話。此外,零售商可購買利用一關鍵字廣告(PPC)模型之一服務,其中當消費者每一次鍵擊零售商之一廣告鏈結時可向該零售商計費。同樣地,由於消費者可能想要避免撥打一電話通話產生之費用,零售商能夠購買一種免付費電話號碼且因而可支付消費者撥入通話之費用。Online advertising has also evolved to use VoIP. For example, an advertiser can provide a hyperlink to one of the retailer's phone numbers, and the keystroke can initiate a call to the retailer in a model known as Point-to-Point (C2C). In addition, the retailer may purchase a service utilizing one of the keyword advertising (PPC) models, wherein the retailer may bill the retailer each time a customer clicks on the advertising link. Similarly, since the consumer may want to avoid the cost of making a phone call, the retailer can purchase a pay-free phone number and thus pay for the consumer's incoming call.

然而,這會導致一種可能之問題,因為垃圾電話發話者可能撥打許多電話給該零售商而濫用系統,不論是獨立地撥打或以一電腦化撥號設計之一部分,或更糟地,可能由一競爭者對特定零售商進行蓄意擾亂。However, this can lead to a possible problem, because the spammer can make a lot of calls to the retailer and abuse the system, either independently or in one part of a computerized dial-up design, or worse, possibly by a competition. Deliberate disruption of specific retailers.

本發明有助於運用一VoIP應用程式(或其他通訊系統)利用一使用者介面中之一超鏈結以啟動通話,其為一網頁介面使用者與在較佳的情形中為貨物和/或服務之一零售商間之通話。當使用者鍵擊經反白(highlighted)之電話號碼,可將與該超鏈結關聯之電話號碼提供給通訊應用程式以協助撥打一電話。然而,在通話接通前,亦會要求使用者提供可供回撥之一電話號碼以橋接通話,且可評估與電話號碼相關之濫用準則。若符合該濫用準則,則不會接通該通話。The present invention facilitates the use of a VoIP application (or other communication system) to initiate a call using one of a user interface, which is a web interface user and, in the preferred case, goods and/or A call between one of the retailers. When the user taps the highlighted phone number, the phone number associated with the hyperlink can be provided to the communication application to assist in making a call. However, before the call is connected, the user is also required to provide a callback number to bridge the call, and the abuse criteria associated with the phone number can be evaluated. If the abuse criterion is met, the call will not be reached.

在一種具體實施例中,一第一種濫用準則計算使用者未回應之回撥次數。若號碼超過某些預設限制,則可限制使用者接通該通話。舉例而言,若使用者未回應回撥之次數達三次,則可對使用者限制一設定之時間區間,如,30分鐘。若濫用型態持續,例如24小時,則可進行較長時間或永久之限制。可將該限制紀錄於通訊系統維護之一「黑名單」中。In a specific embodiment, a first abuse criterion calculates the number of callbacks that the user did not respond to. If the number exceeds some preset limit, the user can be restricted from connecting to the call. For example, if the user does not respond to the number of callbacks three times, the user may be limited to a set time interval, for example, 30 minutes. If the abuse pattern persists, for example 24 hours, a longer or permanent restriction can be made. This limit can be recorded in one of the "blacklists" of communication system maintenance.

在另一種具體實施例中,一第二種濫用準則可計算相同目標電話號碼已經通話之次數。若號碼超過某些預設限制,則可施加一限制且不會接通該通話。可在網頁介面使用者之電話號碼或目標電話號碼上施加限制。或者是,若號碼在一指定時期超過某些預設限制,則可限制使用者接通該通話。舉例而言,若使用者嘗試一再撥打相同零售商,如,在3分鐘內打了30通話,則可以某期間來限制使用者,如,10分鐘。若濫用型態持續,例如24小時,則可進行較長時間或永久之限制。In another specific embodiment, a second abuse criterion can count the number of times the same target phone number has been called. If the number exceeds some preset limit, a limit can be imposed and the call will not be reached. A limit can be imposed on the phone number or target phone number of the web interface user. Or, if the number exceeds certain preset limits for a specified period of time, the user can be restricted from connecting to the call. For example, if the user attempts to dial the same retailer repeatedly, for example, if 30 calls are made within 3 minutes, the user may be restricted for a certain period of time, for example, 10 minutes. If the abuse pattern persists, for example 24 hours, a longer or permanent restriction can be made.

發明內容之目的在以一種簡化之形式提出下文進一步詳述之實施方式的一所選概念之簡介。發明內容之目的不在於指出申請專利範圍標的物之關鍵功能或主要功能,且不應將其用以協助決定申請專利範圍標的物之範圍。SUMMARY OF THE INVENTION The object of the summary is to present a simplified description of a selected concept of the embodiments described in further detail below. The summary is not intended to identify key features or main functions of the subject matter of the patent application, and should not be used to assist in determining the scope of the subject matter of the patent application.

本發明描述利用一VoIP應用程式以由一網頁介面使用者啟動通話。在一種具體實施例中,一網頁包括一通話超鏈結,當經使用者鍵擊時,可啟動一處理以撥叫與該超鏈結關聯之電話號碼。要求使用者提供他/她想用於回撥之一電話號碼。若由使用者所提供之電話號碼不在一可禁止與該號碼往返通話的限制清單上,則可藉由將使用者之電話號碼和與通話超鏈結關聯之電話號碼進行橋接以接通該通話。The present invention describes the use of a VoIP application to initiate a call by a web interface user. In one embodiment, a web page includes a call hyperlink that, when invoked by a user, initiates a process to dial a phone number associated with the hyperlink. Ask the user to provide one of the phone numbers he/she wants to use to call back. If the telephone number provided by the user is not on a restricted list that prohibits a round-trip call with the number, the call can be connected by bridging the user's telephone number with the telephone number associated with the call hyperlink. .

有利地,在通話接通之前,可建立並評估濫用準則而能夠避免惡意及濫用計策,包括惡作劇電話或垃圾電話。若符合該濫用準則,則不會接通通話。此外,可針對濫用發話人之電話號碼進行限制,以便在某一時期中防止該發話人進行額外通話。或者是,可針對目標電話號碼進行限制。一種濫用準則可追蹤網頁介面使用者提供之電話號碼未回應回撥之次數。由於提供一電話號碼且之後當系統回撥以橋接通話時卻未回應顯得很奇怪,因此若符合該準則就會對使用者之電話號碼加以限制。另一種濫用準則可追蹤在一短時期內對相同電話號碼之多重撥號。若符合該準則,可對使用者之電話號碼或目標電話號碼加以限制。若使用者經識別為濫用者時,可設計這些準則,以產生多重限制層級。舉例而言,一第一種限制可以是一有限時段、一第二種限制層級可以是一較長時段、及一第三種限制層級可以是永久。Advantageously, the abuse criteria can be established and evaluated before the call is connected to avoid malicious and abusive strategies, including prank calls or spam calls. If the abuse criterion is met, the call will not be connected. In addition, restrictions can be placed on the abuse of the caller's phone number to prevent the caller from making additional calls during a certain period of time. Or, you can limit the target phone number. An abuse criterion can track the number of times a phone number provided by a user of a web interface does not respond to a callback. Since it is strange to provide a phone number and then fail to respond when the system calls back to bridge the call, the user's phone number is restricted if the criteria are met. Another abuse criterion can track multiple dialing of the same phone number in a short period of time. If the criteria are met, the user's phone number or destination phone number can be restricted. These criteria can be designed to create multiple restriction levels if the user is identified as an abuser. For example, a first restriction may be a finite period of time, a second restriction level may be a longer period of time, and a third restriction level may be permanent.

第1圖為一種一般區塊圖,闡明在一網路中提供通訊(如,VoIP)之一系統的一種具體實施例,其中運算裝置10和一網路12如網際網路連接。運算裝置10可以是任何適當運算裝置包括一個人電腦、筆記型電腦、手持式裝置、行動電話等。運算裝置10包括合適之軟體和/或硬體以允許在網際網路12中通訊。舉例而言,運算裝置10可包括一VoIP軟體應用程式其可透過一網路介面通訊連接。1 is a general block diagram illustrating a specific embodiment of a system for providing communication (e.g., VoIP) in a network in which computing device 10 and a network 12 are connected as an Internet. The computing device 10 can be any suitable computing device including a personal computer, a notebook computer, a handheld device, a mobile phone, and the like. The computing device 10 includes suitable software and/or hardware to allow communication in the Internet 12. For example, computing device 10 can include a VoIP software application that can communicate over a network interface.

第1圖亦闡明連接至網際網路12之運算裝置14及介面16。介面16亦連接至電話網路18。運算裝置14可以是任何類型之運算裝置其能夠和其他運算裝置進行通訊。電話網路18為習知的公眾交換電話網路(PSTN)。介面16包括硬體其可在舊有電話網路18及網際網路12之數據網路間提供一介面。舉例而言,介面16可以是一或更多種電腦其可透過網際網路12接收VoIP通訊並將那些通訊傳送至電話網路18,亦可將語音通訊由電話網路18傳送至網際網路12之VoIP通訊。可想見,運算裝置10之一使用者可利用VoIP技術透過電話網路18撥打電話給運算裝置14上之另一種使用者、或一傳統、無線、或行動電話之一使用者。在其他具體實施例中,使用者可利用具有一配接器之一標準電話而非運算裝置10來撥打電話。FIG. 1 also illustrates the computing device 14 and interface 16 connected to the Internet 12. Interface 16 is also coupled to telephone network 18. The computing device 14 can be any type of computing device that is capable of communicating with other computing devices. The telephone network 18 is a conventional public switched telephone network (PSTN). The interface 16 includes hardware that provides an interface between the old telephone network 18 and the data network of the Internet 12. For example, interface 16 can be one or more computers that can receive VoIP communications over the Internet 12 and communicate those communications to the telephone network 18, as well as voice communications from the telephone network 18 to the Internet. 12 VoIP communication. It is envisioned that a user of computing device 10 can utilize VoIP technology to make a call over telephone network 18 to another user on computing device 14, or to a user of a conventional, wireless, or mobile phone. In other embodiments, the user can make a call using a standard telephone having one of the adapters instead of the computing device 10.

第2圖闡明一適當一般運算環境100之一種實施例,其可用以實作第1圖闡明之某些元件。舉例而言,運算系統100可用以實作使用者運算裝置10、運算裝置14、或介面16。應指出,運算系統100僅為一適當運算環境之一種實施例且其本意並非對此處所述技術之使用或功能的範圍提出任何限制。亦不應將運算系統100解釋為對於示範性作業環境100中闡明之元件的任一者或其組合有任何依賴性或需求。FIG. 2 illustrates an embodiment of a suitable general computing environment 100 that can be used to implement certain elements illustrated in FIG. For example, computing system 100 can be implemented to implement user computing device 10, computing device 14, or interface 16. It should be noted that computing system 100 is only one embodiment of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the techniques described herein. The computing system 100 should also not be construed as having any dependency or requirement relating to any one or combination of elements set forth in the exemplary operating environment 100.

此處所述之技術可在多種一般用途或特別用途運算系統環境或組態中作業。適合運用之習知運算系統、環境、和/或組態的實施例包括,但不限於,個人電腦、伺服器電腦、手持式或膝上型裝置、個人數位助理、電話(有線、無線、或行動)、多處理器系統、以微處理器為基礎之系統、機上盒、可程式化消費性電子產品、網路PC、迷你電腦、主機電腦、包括上述系統或裝置之任一者的分散式運算環境、及與其相似者。The techniques described herein can operate in a variety of general purpose or special purpose computing system environments or configurations. Embodiments of conventional computing systems, environments, and/or configurations suitable for use include, but are not limited to, personal computers, server computers, handheld or laptop devices, personal digital assistants, telephones (wired, wireless, or Mobile), multiprocessor systems, microprocessor-based systems, set-top boxes, programmable consumer electronics, network PCs, minicomputers, host computers, dispersions including any of the above systems or devices The computing environment, and similar.

可在電腦可執行指令之一般脈絡下描述該系統,如一電腦執行之程式模組。一般而言,程式模組包括常式、應用程式、物件、元件、資料結構等,其可執行特定任務或實作特定抽象資料類型。系統亦可實作於分散式運算環境中,其中由透過一通訊網路連結之遠端處理裝置來執行任務。在一分散式運算環境中,程式模組可位於本機及遠端電腦儲存媒體中,包括記憶體儲存裝置。The system can be described in the general context of computer-executable instructions, such as a computer-executed program module. In general, program modules include routines, applications, objects, components, data structures, etc., which can perform specific tasks or implement specific abstract data types. The system can also be implemented in a decentralized computing environment where tasks are performed by remote processing devices that are coupled through a communications network. In a distributed computing environment, the program modules can be located in the local and remote computer storage media, including memory storage devices.

參照第2圖,一示範性運算系統包括一種一般用途電腦110。電腦110元件可包括,但不限於,一處理單元120(其可包括多重處理器),一系統記憶體130、以及將各種系統元件包括系統記憶體耦合至處理單元120的一種系統匯流排121。系統匯流排121可以是多種匯流排結構類型之任一種,包括運用多種匯流排架構之任一種的一記憶體匯流排或記憶卡、一周邊匯流排、以及一區域匯流排。作為例示而非限制,此架構包括工業標準架構(ISA)匯流排、微通道架構(MCA)匯流排、延伸型ISA(EISA)匯流排、視訊電子標準協會(VESA)區域匯流排、以及周邊元件互連(PCI)匯流排亦稱為Mezzanine匯流排。Referring to Figure 2, an exemplary computing system includes a general purpose computer 110. Computer 110 components can include, but are not limited to, a processing unit 120 (which can include multiple processors), a system memory 130, and a system bus 121 that couples various system components, including system memory, to processing unit 120. The system bus bar 121 can be any of a variety of bus bar structure types, including a memory bus or memory card, a peripheral bus bar, and a regional bus bar that utilize any of a variety of bus bar architectures. By way of illustration and not limitation, the architecture includes industry standard architecture (ISA) bus, micro channel architecture (MCA) bus, extended ISA (EISA) bus, video electronic standards association (VESA) area bus, and peripheral components The interconnect (PCI) bus is also known as the Mezzanine bus.

電腦110通常包括多種電腦可讀取媒體。電腦可讀取媒體可以是任何可供電腦110存取之可用媒體,且包括揮發性及非揮發性媒體、以且可移除及非可移除媒體。作為例示而非限制,電腦可讀取媒體可至少包含電腦儲存媒體與通訊媒體。電腦儲存媒體包括揮發性及非揮發性、可移除及非可移除媒體,其可於任何方法或技術中實作而儲存例如電腦可讀取指令、資料結構、程式模組或其他資料。電腦儲存媒體包括但不限於,RAM、ROM、EEPROM、快閃記憶體、或其他記憶體技術、CD-ROM、數位多功能影音光碟(DVD)、或其他光學儲存碟片、磁匣、磁帶、磁片儲存、或其他磁性儲存裝置、或任何其他可用於儲存所需資訊且該資訊可供電腦110存取之媒體。通訊媒體通常具體實現電腦可續取指令、資料結構、程式模組、或一調頻資料信號之其他資料,該調頻資料信號例如一載波、或其他傳輸機制,包括任何資訊傳遞媒體。「調頻資料信號」一詞係指一信號,透過一方法如編碼該信號中之資訊,而設定或改變該信號之一或更多種性質。作為例示而非限制,通訊媒體包括有線媒體,例如一種有線網路或直接纜線連線;以及無線媒體,例如音波、無線電射頻、紅外線以及其他無線媒體。電腦可讀取媒體之範圍應包括任何上述媒體之組合。Computer 110 typically includes a variety of computer readable media. The computer readable medium can be any available media that is accessible to the computer 110 and includes both volatile and non-volatile media, and removable and non-removable media. By way of illustration and not limitation, computer readable media may include at least computer storage media and communication media. Computer storage media includes volatile and non-volatile, removable and non-removable media, which can be implemented in any method or technology, such as computer readable instructions, data structures, program modules or other materials. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory, or other memory technology, CD-ROM, digital versatile audio and video (DVD), or other optical storage discs, magnetic tape, magnetic tape, A magnetic disk storage, or other magnetic storage device, or any other medium that can be used to store the desired information and that is accessible to the computer 110. The communication medium usually implements a computer renewable command, a data structure, a program module, or other information of a frequency modulated data signal, such as a carrier wave or other transmission mechanism, including any information delivery medium. The term "frequency modulated data signal" means a signal that is set or changed by one of the methods, such as encoding information in the signal. By way of illustration and not limitation, communication media includes wired media, such as a wired network or direct cable connection, and wireless media such as sound waves, radio frequency, infrared, and other wireless media. The range of computer readable media should include any combination of the above media.

該系統記憶體130包括形式為揮發性和/或非揮發性記憶體之電腦儲存媒體,例如唯續記憶體(ROM)131、以及隨機存取記憶體(RAM)132。一種基本輸入/輸出系統133(BIOS)通常儲存於ROM 131中,該基本輸入/輸出系統133帶有基本常式,可在例如電腦110之開機期間中於元件間傳遞資訊。RAM 132通常帶有資料和/或程式模組,前述資料和/或程式模組可立即供處理單元120存取或正在由處理單元120作業中。作為例示而非限制,第2圖闡明作業系統134、應用程式135、其他程式模組136、以及程式資料137。The system memory 130 includes computer storage media in the form of volatile and/or non-volatile memory, such as a serial only memory (ROM) 131, and a random access memory (RAM) 132. A basic input/output system 133 (BIOS) is typically stored in ROM 131, which has a basic routine for communicating information between components during, for example, the powering up of computer 110. RAM 132 typically carries data and/or program modules that are immediately accessible to processing unit 120 or are being processed by processing unit 120. By way of illustration and not limitation, FIG. 2 illustrates an operating system 134, an application 135, other program modules 136, and program data 137.

電腦110亦可包括其他可移除/非可移除,揮發性/非揮發性電腦儲存媒體。僅做為例示,第2圖闡明一硬碟機141,其可讀取或寫入非可移除、非揮發性磁性媒體;一磁碟機151,其可讀取或寫入一可移除、非揮發性磁碟152;以及一光碟機155,其可讀取或寫入一可移除、非揮發性光碟156,例如一CD ROM或其他光學媒體。在該示範性作業環境中可使用的其他可移除/非可移除、揮發性/非揮發性電腦儲存媒體包括但不限於,磁帶、磁匣、快閃記憶卡、數位多功能影音光碟、數位影帶、固態RAM、固態ROM、及與其相似者。硬碟機141通常經由一非可移除記憶體介面如介面140連接至系統匯流排121,且磁碟機151及光碟機155通常經由一可移除記憶體介面如介面150連接至系統匯流排121。Computer 110 may also include other removable/non-removable, volatile/non-volatile computer storage media. By way of example only, Figure 2 illustrates a hard disk drive 141 that can read or write non-removable, non-volatile magnetic media; a disk drive 151 that can be read or written as a removable , a non-volatile disk 152; and an optical disk drive 155 that can read or write a removable, non-volatile optical disk 156, such as a CD ROM or other optical medium. Other removable/non-removable, volatile/non-volatile computer storage media that may be used in this exemplary operating environment include, but are not limited to, magnetic tape, magnetic tape, flash memory cards, digital versatile audio and video discs, Digital video tape, solid state RAM, solid state ROM, and similar. The hard disk drive 141 is typically connected to the system bus bar 121 via a non-removable memory interface, such as interface 140, and the disk drive 151 and the optical disk drive 155 are typically connected to the system bus via a removable memory interface, such as interface 150. 121.

第2圖中討論及闡明之磁碟機及相關之電腦儲存媒體,可供電腦110儲存電腦可讀取指令、資料結構、程式模組、及其他資料。舉例而言,在第1圖中,闡明硬碟機141可儲存作業系統144、應用程式145、其他程式模組146、以及程式資料147以程式化處理器(們)執行此處所述之方法。須注意這些元件可以和作業系統134、應用程式135、其他程式模組136、以及程式資料137相同或不同。此處以不同編號來指稱作業系統144、應用程式145、其他程式模組146、以及程式資料147,以便至少闡明其為不同之複本。一使用者可透過輸入裝置例如一鍵盤162、一指向裝置161通常稱為一滑鼠、軌跡球、或觸控板將指令以及資訊輸入至電腦110。其他輸入裝置(此處未顯示)可包括一麥克風、搖桿、遊戲墊、衛星碟、掃描器、或與其相似者。這些及其他輸入裝置通常透過一種耦合至系統匯流排之使用者輸入介面160而連接至處理單元120,但可經由其他介面及匯流排結構來連接,例如一平行連接埠、遊戲連接埠或一種通用序列匯流排(USB)。亦可透過一介面,如視訊介面190,將一螢幕191或其他類型之顯示裝置連接至該系統匯流排121。除了螢幕之外,電腦如該運算裝置110亦可包括其他周邊輸出裝置,例如擴音器197及印表機196,其可利用一輸入周邊介面194進行連接。The disk drive and related computer storage media discussed and illustrated in FIG. 2 are provided for the computer 110 to store computer readable commands, data structures, program modules, and other materials. For example, in FIG. 1, the hard disk drive 141 can store the operating system 144, the application program 145, the other program modules 146, and the program data 147 to program the processor(s) to perform the methods described herein. . It should be noted that these components may be the same or different from operating system 134, application 135, other programming modules 136, and program data 137. The operating system 144, the application program 145, the other program modules 146, and the program data 147 are referred to herein by different numbers to at least clarify that they are different copies. A user can input commands and information to the computer 110 via an input device such as a keyboard 162, a pointing device 161, commonly referred to as a mouse, trackball, or trackpad. Other input devices (not shown here) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are typically coupled to the processing unit 120 via a user input interface 160 coupled to the system bus, but may be connected via other interfaces and busbar structures, such as a parallel port, game port, or a general purpose Sequence bus (USB). A screen 191 or other type of display device can also be connected to the system busbar 121 via an interface, such as video interface 190. In addition to the screen, the computer, such as the computing device 110, can also include other peripheral output devices, such as a microphone 197 and a printer 196, which can be connected using an input peripheral interface 194.

電腦110可在一網路化環境中作業,利用邏輯連接至一或更多種遠端電腦,例如一遠端電腦180。該遠端電腦180可以是一個人電腦、一伺服器、一路由器、一網路個人電腦、一對等裝置、或其他常見網路節點,雖然在第2圖中,僅闡明一種記憶體儲存裝置181,該遠端電腦通常包括上述關於電腦110之元件中的多種或全部。第2圖所示之邏輯連接包括一區域網路(LAN)171、以及一廣域網路(WAN)173,但亦可包括其他網路。此種網路化環境為辦公場所、企業內電腦網路、內部互連網、以及網際網路中所常見。在一種具體實施例中,第1圖之運算裝置10係由運算裝置110所實作,且運算裝置14係由遠端電腦180所實作。The computer 110 can operate in a networked environment, using logic to connect to one or more remote computers, such as a remote computer 180. The remote computer 180 can be a personal computer, a server, a router, a network personal computer, a pair of devices, or other common network nodes, although in FIG. 2, only one memory storage device 181 is illustrated. The remote computer typically includes a plurality or all of the elements described above with respect to computer 110. The logical connections shown in Figure 2 include a local area network (LAN) 171 and a wide area network (WAN) 173, but may also include other networks. Such a networked environment is common in office spaces, in-house computer networks, intranets, and the Internet. In one embodiment, the computing device 10 of FIG. 1 is implemented by the computing device 110, and the computing device 14 is implemented by the remote computer 180.

當用於一LAN網路化環境中時,電腦110係透過一網路介面或配接卡170連接至LAN 171。當用於一WAN路化環境中時,電腦110通常包括一數據機172或其他可透過WAN 173建立連線之方法如網際網路。數據機172可以是內建或外接,能透過使用者輸入介面160、或其他適當機制連接至系統匯流排121。在一網路化環境中,關於電腦110所示之程式模組或其中之部分可儲存於遠端記憶體儲存裝置中。作為例示而非限制,第2圖闡明遠端應用程式185係位於記憶體裝置181上。可以了解,此處所示之網路連線為示範性,且可利用其他可在電腦間建立一通訊連線之方法。When used in a LAN networked environment, the computer 110 is connected to the LAN 171 via a network interface or adapter card 170. When used in a WAN environment, the computer 110 typically includes a modem 172 or other means of establishing a connection through the WAN 173, such as the Internet. The modem 172 can be either built-in or external and can be coupled to the system bus 121 via a user input interface 160, or other suitable mechanism. In a networked environment, the program modules shown in computer 110 or portions thereof may be stored in the remote memory storage device. By way of illustration and not limitation, FIG. 2 illustrates that remote application 185 is located on memory device 181. It can be appreciated that the network connections shown here are exemplary and other methods of establishing a communication connection between computers can be utilized.

本系統之一種具體實施例係關於特定實施例,其中一網頁介面使用者透過一網頁上之一超鏈結啟動一電話。在此特定實施例中,使用者為一消費者且打算與一零售商通話,雖然可與一個人或任何其他合適之電話號碼通話。超鏈結為一隨點即通服務之一功能,其係由一服務提供者提供,其可以是一企業服務提供者,如MSN、Yahoo、AOL、或其他線上服務提供者。A specific embodiment of the system is directed to a particular embodiment in which a web interface user initiates a call through a hyperlink on a web page. In this particular embodiment, the user is a consumer and intends to talk to a retailer, although can talk to a person or any other suitable telephone number. Hyperlink is a function of a point-and-click service, which is provided by a service provider, which can be an enterprise service provider, such as MSN. Yahoo AOL , or other online service providers.

參照第3圖,詳細闡明一種典型之以電腦為基礎之語音通訊系統。在本實施例中,網頁介面使用者可利用運算裝置10,其包括一用戶端應用程式10a,如一網頁瀏覽器、及一VoIP應用程式10b。可以理解,用戶端應用程式10a可以是另一種類型之用戶端應用程式,包括舉例而言,納入VoIP能力之一即時通訊(IM)用戶端。在一種具體實施例中,網頁介面使用者想要啟動一通話給目標電話20,其耦合至標準PSTN網路18,且可透過介面16存取。目標電話20可以是任何類型之標準內陸通訊、無線、或行動電話裝置,且可屬於一個體或一零售商,舉例而言。在另一種具體實施例中,目標電話亦可以是網頁介面,其中運算裝置14可具有一用戶端應用程式14a,如一網頁瀏覽器、及一VoIP應用程式14b。Referring to Figure 3, a typical computer-based voice communication system is illustrated in detail. In this embodiment, the web interface user can utilize the computing device 10, which includes a client application 10a, such as a web browser, and a VoIP application 10b. It can be understood that the client application 10a can be another type of client application, including, for example, an instant messaging (IM) client incorporating VoIP capabilities. In one embodiment, the web interface user wants to initiate a call to the target phone 20, which is coupled to the standard PSTN network 18 and is accessible through the interface 16. The target phone 20 can be any type of standard inland communication, wireless, or mobile phone device, and can belong to a single body or a retailer, for example. In another embodiment, the target phone may also be a web interface, wherein the computing device 14 may have a client application 14a, such as a web browser and a VoIP application 14b.

網頁介面使用者利用運算裝置10以經由其和網際網路12建立通訊之瀏覽器10a存取全球資訊網頁,舉例而言,以得到並檢視網頁50之一複本。網頁50可以是其上列出電話號碼之任何全球資訊網頁面,如一零售商廣告或一目錄列表。在一種具體實施例中,網頁50可以是以一搜尋引擎進行一搜尋所產生之搜尋結果。第4圖闡明一搜尋結果網頁50之一種實施例,將於下文詳述。The web interface user utilizes the computing device 10 to access the global information web page via the browser 10a that establishes communication with the Internet 12, for example, to obtain and view a copy of the web page 50. Web page 50 can be any global information web page on which the phone number is listed, such as a retailer advertisement or a directory listing. In one embodiment, web page 50 may be a search result generated by a search engine for a search. Figure 4 illustrates an embodiment of a search results web page 50, which will be described in more detail below.

在某些具體實施例中,由一網頁伺服器62產生網頁50,該網頁伺服器62為服務提供者60之一部分。然而,可以理解,其上包括網頁50之一網頁伺服器可位於服務提供者60之外並與其獨立。不論其是否為網頁伺服器62之一部分、或僅連接至網頁伺服器62,網頁50上之資訊在顯示於網頁50上之前,通常由位於服務提供者60之資料庫64更新。In some embodiments, web page 50 is generated by a web server 62, which is part of service provider 60. However, it will be appreciated that one of the web servers on which web page 50 is included may be located outside of and independent of service provider 60. Whether or not it is part of the web server 62, or only connected to the web server 62, the information on the web page 50 is typically updated by the database 64 located at the service provider 60 prior to being displayed on the web page 50.

在一種具體實施例中,服務提供者60實作一免費隨點即通服務,其中服務提供者可支付一網頁介面發話人與一目標電話號碼之VoIP通話,特別是其中該通話係由服務提供者在一網頁上顯示之一廣告所啟動。In a specific embodiment, the service provider 60 implements a free point-to-point service in which the service provider can pay for a VoIP call between a web interface caller and a target phone number, in particular wherein the call is provided by the service. One of the ads displayed on a web page is launched.

在一種具體實施例中,零售商可向一服務提供者60登記一獨一識別碼,零售商(們)可在一網頁50上顯示該獨一識別碼,並將其和儲存於資料庫64上之獨一識別碼進行比較,以決定網頁50上呈現之何種(如果有的話)零售商已訂購隨點即通服務。In one embodiment, the retailer may register a unique identification code with a service provider 60, and the retailer(s) may display the unique identification code on a web page 50 and store the sum in the database 64. The unique identification code is compared to determine what (if any) the retailer has ordered the point-and-click service on the web page 50.

在一種具體實施例中,零售商可向服務提供者60登記一隨點即通服務,其可以是發明背景中所述關鍵字廣告訂購服務之部分。在一種實施例中,一零售商可向服務提供者針對任何進行之VoIP通話遠有針對零售商在一網頁上之廣告的排名支付一價格。在進一步的具體實施例中,零售商可能僅向服務提供者支付呈現其其廣告之費用或參考通話報告資料以協助零售商追蹤廣告活動或進行最佳人員配置以便更妥善地符合需求模式,並由服務提供者支付所有通話成本。In one embodiment, the retailer may register a point-to-point service with the service provider 60, which may be part of the keyword advertisement subscription service described in the Background of the Invention. In one embodiment, a retailer may pay a price to a service provider for any VoIP call made for a retailer's ranking of advertisements on a web page. In a further embodiment, the retailer may only pay the service provider the cost of presenting its advertisement or refer to the call report material to assist the retailer in tracking the advertising campaign or performing the best staffing to better conform to the demand model, and All call costs are paid by the service provider.

當訂購隨點即通服務時,可將每一訂購零售商加入一「白名單」其係儲存於服務提供者60內之一安全資料庫64中。在替代性具體實施例中,白名單亦可儲存於服務提供者之外的資料庫中。對於每一訂購零售商,白名單可儲存一獨一識別碼其可映射至資料庫中之零售商之名稱、電話號碼、以及在某些具體實施例中,其他可識別之零售商資訊。可將白名單保持在最新並即時更新之,以確保當白名單放置並驗證一零售商之廣告時,其含有關於該零售商及零售商訂購隨點即通服務之最新資訊。When ordering a point-and-click service, each ordering retailer can be added to a "white list" which is stored in a secure repository 64 within the service provider 60. In an alternative embodiment, the whitelist may also be stored in a database other than the service provider. For each ordering retailer, the whitelist can store a unique identification code that can be mapped to the name of the retailer in the database, the phone number, and, in some embodiments, other identifiable retailer information. The whitelist can be kept up to date and updated in real time to ensure that when the whitelist places and verifies a retailer's advertisement, it contains up-to-date information about the retailer's and retailer's ordering point-to-point service.

網頁50上呈現之電話列表通常包括圖形指示器以指出隨點即通功能。舉例而言,第4圖闡明在網頁50上顯示針對華盛頓西雅圖之日本餐廳的一種例示搜尋結果。搜尋結果包括廣告列表90及一較大篇幅廣告92。如第4圖所示,可由多種圖形指示器之任一者指出隨點即通服務。The list of phones presented on web page 50 typically includes a graphical indicator to indicate the point-and-click functionality. For example, Figure 4 illustrates an exemplary search result displayed on web page 50 for a Japanese restaurant in Seattle, Washington. The search results include an ad list 90 and a larger page ad 92. As shown in FIG. 4, the on-demand service can be indicated by any of a variety of graphical indicators.

舉例而言,在列表90a及較大篇幅廣告92中,可利用醒目提醒或加陰影之電話號碼指明隨點即通服務。可利用一醒目提醒、加陰影和/或專屬圖式作為列表之一部份,如廣告列表90b中所示之醒目提醒之電話圖式,以替代性地或額外地指明隨點即通功能。額外地或替代性地,能夠以「免費通話!!」字詞或其他語句,如廣告列表90c中所示來指明隨點即通功能。習知技藝人士可以理解,有許多其他方式能夠根據本系統向可能之發話人視覺地指明隨點即通功能。For example, in list 90a and larger page advertisements 92, a point-and-click service can be indicated using a bold reminder or a shaded phone number. An eye-catching reminder, a shadow, and/or a proprietary schema may be utilized as part of the list, such as the phonetic representation of the eye-catching reminder shown in the advertisement list 90b, to alternatively or additionally indicate the point-and-click functionality. Additionally or alternatively, the point-and-click functionality can be indicated by a "free call!!" word or other statement, as shown in ad list 90c. It will be understood by those skilled in the art that there are many other ways to visually indicate a point-and-click functionality to a potential caller in accordance with the present system.

在某些具體實施例中,以一隨點即通指示器提供網頁50上之所有電話號碼。在其他具體實施例中,僅針對購買該服務之電話號碼啟動隨點即通指示器。因此,舉例而言,如第4圖所示,列表90d之廣告主並未購買該服務且及因而其列表不包括一通話超鏈結之任何圖形指示器。然而,一服務提供者可選擇提供隨點即通功能給一搜尋結果頁面中傳回或以其他方式提供於一網頁50上之所有廣告主,不論該廣告主是否特別付費購買該功能。在此具體實施例中,服務提供者仍可藉由例如提供關於進行之VoIP通話的使用族群資料而由零售商獲益。如第4圖所示,隨點即通服務可和免付費號碼相關聯,如較大篇幅廣告92中所示,以及和付費號碼相關聯,如廣告列表90中所示。In some embodiments, all of the phone numbers on web page 50 are provided with a point-and-click indicator. In other embodiments, the point-and-click indicator is activated only for the phone number from which the service was purchased. Thus, for example, as shown in FIG. 4, the advertiser of list 90d did not purchase the service and thus its list does not include any graphical indicators of a call hyperlink. However, a service provider may choose to provide a point-and-click functionality to all advertisers that are returned or otherwise provided on a web page 50, regardless of whether the advertiser is paying for the feature. In this particular embodiment, the service provider can still benefit from the retailer by, for example, providing usage community information about the ongoing VoIP call. As shown in FIG. 4, the point-and-click service can be associated with a toll-free number, as shown in larger page advertisement 92, and associated with a paid number, as shown in advertisement list 90.

網頁介面使用者可經由一網路如網際網路12存取具有電話列表之一網頁50,如一目錄搜尋結果或零售商廣告。想和網頁50上列表之一電話號碼建立一通話交談之網頁介面使用者可鍵擊網頁50上顯示之一廣告、電話號碼、和/或圖片包括隨點即通超鏈結及關聯指示器。The web interface user can access a web page 50 having a list of calls, such as a directory search result or a retailer advertisement, via a network such as the Internet 12. A web interface that wants to establish a call conversation with one of the phone numbers on the web page 50. The user can click on the web page 50 to display an advertisement, a phone number, and/or a picture including a point-and-click hyperlink and an associated indicator.

網頁50上包含之一通話超鏈結84允許使用者由一網頁或應用程式進行一VoIP通話,並允許一電腦至電話及一電腦至電腦通話。電腦至電話通話由電腦10發出並終止於電話20,其可以是一固定線路或無線電話、或一行動或衛星電話。電腦至PC通話包括語音、影音、及光學文字對話。此種通話由一PC 10發出,且亦終止於例如一PC 14。因此,運算裝置14可額外地或替代性地透過VoIP應用程式14b具有VoIP能力。一通話超鏈結中之目標位址可包括一電話號碼、一聯絡人資訊(如,一通訊錄中)、一電腦名稱(如JohnDoe PC)或一IP位址(如124.38.110.25)。The web page 50 includes a call hyperlink 84 that allows the user to make a VoIP call from a web page or application and allows a computer to call and a computer to talk to the computer. The computer-to-phone call is sent by the computer 10 and terminates at the phone 20, which can be a fixed line or wireless phone, or an action or satellite phone. Computer to PC calls include voice, audio, and optical text conversations. Such a call is sent by a PC 10 and also terminates, for example, at a PC 14. Thus, computing device 14 may additionally or alternatively have VoIP capabilities through VoIP application 14b. The target address in a call hyperlink may include a phone number, a contact information (eg, in an address book), a computer name (such as John Doe PC), or an IP address (such as 124.38.110.25).

通話超鏈結為服務提供者提供之一種已知功能,且因而不需於此處詳述。舉例而言,服務提供者60可具有一通話管理服務70,如Windows Live(http://get.live.com),其可用以實作通話超鏈結及相關功能還有下述篩選功能。此外,通話管理服務70包括一清單管理員72其可實作篩選功能以評估濫用準則、並協調資料庫64中之白名單及黑名單上儲存之電話號碼的名稱。The call hyperlink is a known function provided by the service provider and thus need not be detailed here. For example, the service provider 60 can have a call management service 70, such as Windows Live (http://get.live.com), which can be used to implement call hyperlinks and related functions as well as the filtering functions described below. In addition, the call management service 70 includes a list administrator 72 that can implement a screening function to evaluate abuse criteria and coordinate the whitelists in the database 64 with the names of the phone numbers stored on the blacklist.

第5圖為一高層級流程圖,闡明利用通話超鏈結之一處理的一種具體實施例。在步驟200,建立一網頁或其他介面之編碼。在步驟202,將一或更多種通話超鏈結加至該編碼。在步驟204,散布該編碼。在一種具體實施例中,當使用者瀏覽一適當網站時,可透過網際網路12散布該編碼。在其他具體實施例中,編碼是透網際網路、零售商電或其他管道散布之一應用程式之部分。在步驟206,一使用者可存取該編碼。舉例而言,一使用者可瀏覽一網站並下載一或更多種網頁或發動一應用程式。在步驟208,使用者可藉由鍵擊一網頁或文件上之一通話超鏈結而選擇之。舉例而言,一網站可包括一網頁其具有某些餐廳之一列表,如第4圖所示,其中該列表包括以「免費通話!」之邀請所標記的一通話超鏈結。鍵擊通話超鏈結可使得能在步驟210由資料庫64識別並檢索與通話超鏈結關聯之目標電話號碼。Figure 5 is a high level flow diagram illustrating a specific embodiment of processing using one of the talk hyperlinks. At step 200, a code for a web page or other interface is created. At step 202, one or more call hyperlinks are added to the code. At step 204, the code is spread. In one embodiment, the code can be distributed over the Internet 12 when the user browses an appropriate website. In other embodiments, the encoding is part of an application that is distributed over the Internet, retailer, or other conduit. At step 206, a user can access the code. For example, a user can browse a website and download one or more web pages or launch an application. In step 208, the user can select by tapping on a web page or one of the call hyperlinks on the file. For example, a website may include a web page having a list of certain restaurants, as shown in FIG. 4, wherein the list includes a call hyperlink linked by an invitation to "free call!". The keystroke call hyperlink can enable the database 64 to identify and retrieve the target phone number associated with the talk hyperlink in step 210.

在某些VoIP具體實施例中,鍵擊通話超鏈結可直接啟動VoIP通話交談。然而,在本具體實施例中,基於安全性理由,鍵擊網頁50上之電話號碼(步驟208)不會直接啟動VoIP通話交談,即便在步驟210識別該目標號碼。否則,使用者有可能挾持表列之通話超鏈結以便利用顯示之鏈結與目標電話號碼以外之一受話者進行一VoIP通話。In some VoIP embodiments, the keystroke hyperlink can initiate a VoIP call conversation directly. However, in this particular embodiment, for security reasons, the phone number on the keystroke web page 50 (step 208) does not directly initiate a VoIP call conversation, even if the target number is identified in step 210. Otherwise, the user may hold the list of call hyperlinks to make a VoIP call with one of the recipients outside the target phone number using the displayed link.

因此,在步驟212可向網頁介面使用者呈現一彈出式螢幕其可要求使用者欲供回撥之一電話號碼,以回應在步驟208選擇之通話超鏈結及在步驟210向系統識別之目標號碼。當輸入使用者之回撥電話號碼,將使用者之回撥電話號碼及目標電話號碼二者和資料庫64中儲存之限制清單進行比較。因此,在步驟214,將使用者之電話號碼和資料庫64之限制號碼的一「黑名單」進行比較。若使用者之電話號碼屬於該黑名單,則在步驟216不會接通該通話,且使用者在步驟218會接到一錯誤訊息。相似地,在步驟220,亦會將與超鏈結關聯之目標電話號碼與資料庫64儲存之一「勿通話」清單相比較。若目標電話號碼屬於該勿通話清單,則在步驟216不會接通該通話,且使用者在步驟218會接到一錯誤訊息。Thus, at step 212, the web interface user can be presented with a pop-up screen that can request the user to request a callback number in response to the call hyperlink selected in step 208 and the target identified to the system in step 210. number. When the user's callback telephone number is entered, both the user's callback telephone number and the destination telephone number are compared with the restriction list stored in the database 64. Therefore, at step 214, the user's phone number is compared to a "blacklist" of the restricted number of the database 64. If the user's phone number belongs to the blacklist, the call will not be reached in step 216, and the user will receive an error message in step 218. Similarly, at step 220, the target phone number associated with the hyperlink is also compared to a "Do Not Call" list stored in the repository 64. If the target phone number belongs to the call list, the call will not be reached in step 216 and the user will receive an error message in step 218.

若未限制任一種電話號碼,則在步驟222,評估預定義之第一種濫用準則。第一種濫用準則可實作成一或更多種軟體篩選器,如下文第6圖進一步詳述。然而,一般而言,第一種濫用準則可追蹤使用者(發話人)之濫用形式,且當濫用形式超過預定義之限制時可施加該限制。第一種濫用準則亦可追蹤對一目標號碼之過量撥打,即便並非來自一單一發話號碼。可隨著濫用本質之不同,在使用者之電話號碼、或目標電話號碼上施加該限制。If either phone number is not restricted, then at step 222, a predefined first abuse criterion is evaluated. The first abuse criterion can be implemented as one or more software filters, as further detailed in Figure 6 below. However, in general, the first abuse criterion can track the abuse form of the user (talker) and can impose this limit when the abuse form exceeds a predefined limit. The first abuse criterion can also track excessive calls to a target number, even if it is not from a single caller number. This restriction can be imposed on the user's phone number, or the target phone number, depending on the nature of the abuse.

若未符合第一種濫用準則,則在步驟224,能夠以在步驟212識別之電話號碼回撥給使用者。在步驟226若使用者回應該回撥,則在步驟228可撥叫目標號碼。在步驟230若目標號碼回應,則在步驟232系統可橋接二種號碼並接通該通話。If the first abuse criterion is not met, then at step 224, the user can be dialed back with the phone number identified at step 212. If the user should return the callback in step 226, the target number can be dialed in step 228. If the target number is answered in step 230, then in step 232 the system can bridge the two numbers and turn the call on.

若符合該第一種濫用準則,則在步驟234,可隨著濫用本質之不同對使用者之電話號碼、或目標電話號碼之任一者施加限制,且在步驟236產生一錯誤訊息。If the first abuse criterion is met, then at step 234, a limit may be imposed on either of the user's phone number or the target phone number as the nature of the abuse differs, and an error message is generated in step 236.

在步驟226若使用者未回應該回撥,則在步驟238可評估預定義之第二種濫用準則。第二種濫用準則亦可實作成一或更多種軟體篩選器,如下文第7圖進一步詳述。然而,一般而言,第二種濫用準則可追蹤在步驟226使用者(發話者)回應該回撥之多次失敗。In step 226, if the user has not returned a callback, then at step 238, a predefined second abuse criterion can be evaluated. The second abuse criterion can also be implemented as one or more software filters, as further detailed in Figure 7 below. However, in general, the second abuse criterion can track the multiple failures that the user (talker) should return in step 226.

若未符合第二種濫用準則,則處理回到步驟224並再度回撥給使用者。多次回應失敗最終將符合篩選器之第二種準則。If the second abuse criterion is not met, the process returns to step 224 and is again dialed back to the user. Multiple response failures will eventually meet the second criterion of the filter.

若符合第二種濫用準則(代表存在一濫用或可疑情況),則在步驟234施加限制,且在步驟236產生一錯誤訊息。If the second abuse criterion is met (representing the presence of an abuse or suspicious condition), then a limit is imposed at step 234 and an error message is generated at step 236.

在一種具體實施例中,可將一VoIP用戶端下載至網頁介面使用者之運算裝置10。在此具體實施例中,清單管理員72可包括已知設計之一軟體撥號器以便由網頁介面使用者透過一VoIP連線80初始一VoIP通話,且該通話之後可透過一節點在一連線82中經由介面16繞送至一PSTN電話公司夥伴18。其後,電話公司夥伴可將PSTN通話接通至一電話20。In a specific embodiment, a VoIP client can be downloaded to the computing device 10 of the web interface user. In this embodiment, the inventory manager 72 may include a software dialer of a known design to initiate a VoIP call by the web interface user via a VoIP connection 80, and the call may be connected through a node after the call. 82 is routed via interface 16 to a PSTN telephone company partner 18. Thereafter, the telephone company partner can connect the PSTN call to a telephone 20.

發話人可能無法見到上述評估濫用準則之步驟。一旦網頁介面使用者鍵擊通話超鏈結而啟動一通話時,使用者可能僅聽到他/她的電話響鈴並在步驟226回應之,之後聽到其撥叫之號碼響鈴且在步驟230零售商回應該通話。其後,在步驟232橋接並接通號碼,且可進行網頁介面使用者及目標電話號碼間之通話交談。The caller may not be able to see the above steps for assessing the abuse criteria. Once the web interface user initiates a call by tapping the call hyperlink, the user may only hear his/her phone ringing and respond at step 226, then hear the dialed number ring and retail at step 230. The merchant should call back. Thereafter, the number is bridged and connected in step 232, and a conversation between the web interface user and the target telephone number can be made.

清單管理員72可包括通當軟體以防止鍵擊詐欺。鍵擊詐欺可能發生於,舉例而言,當競爭者藉由重複撥打VoIP電話給一零售商,以試圖並增加其成本。或者是,惡作劇者也可能進行鍵擊詐欺,如重複撥打一號碼之小孩,或回應第5圖之步驟210的要求而提出他人之號碼。清單管理員72可藉由限制來自一單一發話人之通話,以處理這些問題。Inventory administrator 72 may include software to prevent keystrokes. Keystroke fraud can occur, for example, when competitors try to increase their costs by repeatedly making VoIP calls to a retailer. Alternatively, the prankster may also perform keystroke fraud, such as repeatedly dialing a child of a number, or responding to the request of step 210 of Figure 5 to present the number of the other person. The list manager 72 can handle these issues by restricting calls from a single caller.

更明確地說,清單管理員72可包括邏輯篩選器其使得能夠設定在步驟222及238中用以識別可疑或有問題發話人之準則。舉例而言,第6圖闡明一種處理其可用以在步驟222識別來自網頁介面使用者之通話的一濫用形式。此處理包括篩選器以追蹤網頁介面使用者在一短時期中向相同目標電話號碼進行多重通話之形式。當在步驟214識別該網頁介面使用者之電話號碼不屬於黑名單之後,且在步驟220識別目標電話不屬於一勿通話清單後,在步驟300清單管理員72可檢查在一最近時期中對目標電話號碼進行了多少次通話。舉例而言,可將一初始定限層級設定為3分鐘內3次通話。若未超過該層級,則在步驟224回撥給使用者並繼續該處理。More specifically, inventory administrator 72 may include a logic filter that enables setting of criteria for identifying suspicious or problematic talkers in steps 222 and 238. For example, Figure 6 illustrates a form of abuse that can be used to identify a call from a web interface user at step 222. This process includes a filter to track the way the web interface user makes multiple calls to the same destination phone number in a short period of time. After identifying in step 214 that the phone number of the web interface user does not belong to the blacklist, and after step 220 identifies that the target phone does not belong to a call list, in step 300 the list manager 72 can check the target in a recent period. How many calls have been made to the phone number. For example, an initial threshold level can be set to 3 calls in 3 minutes. If the level is not exceeded, then the user is called back in step 224 and the process continues.

若反之,超過了定限層級,可處理二種平行路徑。在步驟302,清單管理員72計算網頁介面使用者之電話號碼已經啟動之通話次數。在步驟304,清單管理員72計算目標電話號碼已進行通話之次數。If, on the other hand, the limit level is exceeded, two parallel paths can be processed. At step 302, the list manager 72 calculates the number of calls that the web interface user's phone number has initiated. At step 304, the list manager 72 counts the number of times the target phone number has been made.

進行步驟302以下之路徑,在步驟306評估一第一種限制A。舉例而言,可設定限制A以追蹤網頁介面使用者是否已在3分鐘內回撥3次。若未符合限制A,則處理繼續並在步驟224回撥網頁介面使用者。然而,若已符合限制A,則該處理亦可在步驟308評估限制B。舉例而言,可設定限制B以追蹤網頁介面使用者是否已在6分鐘內回撥6次。若不符合限制B,則在步驟310將一第一中斷(blackout)時期施加於網頁介面使用者之電話號碼。舉例而言,第一中斷視窗可針對接通與網頁介面使用者之電話號碼的通話施加一10分鐘限制。若符合限制B,則在步驟312該處理可評估限制C。舉例而言,可設定限制C以追蹤網頁介面使用者是否已在24小時內超過限制B四次。若否,則在步驟314對網頁介面使用者之電話號碼施加一第二中斷視窗。舉例而言,第二中斷視窗可針對接通與網頁介面使用者之電話號碼的通話施加一60分鐘限制。若符合限制C,則在步驟316將網頁介面使用者之電話號碼加至黑名單。A path below step 302 is performed, and a first type of restriction A is evaluated in step 306. For example, limit A can be set to track whether the web interface user has dialed back 3 times within 3 minutes. If the limit A is not met, the process continues and the page interface user is replied to in step 224. However, if limit A has been met, the process may also evaluate limit B at step 308. For example, limit B can be set to track whether the web interface user has dialed back 6 times within 6 minutes. If the limit B is not met, a first blackout period is applied to the phone number of the web interface user at step 310. For example, the first interrupt window can impose a 10-minute limit on the call to the phone number of the web interface user. If limit B is met, then at step 312 the process can evaluate limit C. For example, limit C can be set to track whether the web interface user has exceeded limit B four times within 24 hours. If not, a second interrupt window is applied to the phone number of the web interface user in step 314. For example, the second interrupt window can impose a 60 minute limit on the call to the phone number of the web interface user. If the limit C is met, the phone number of the web interface user is added to the blacklist in step 316.

進行步驟304以下之路徑,在步驟318評估一第一種限制D。舉例而言,可設定限制D以追蹤是否已在3分鐘內撥打目標電話號碼30次。若不符合限制D,則處理繼續並在步驟224回撥網頁介面使用者。然而,若已符合限制D,則在步驟320該處理亦會評估限制E。舉例而言,可設定限制E以追蹤是否已在5分鐘內撥打目標電話號碼50次。若不符合限制E,則在步驟310將一第一中斷時期施加於目標電話號碼,如,針對接通與目標電話號碼之通話施加一10分鐘限制。若符合限制E,則在步驟322該處理可評估限制F。舉例而言,可設定限制F以追蹤對於撥打目標電話之限制E是否已在24小時內超過4次。若否,則在步驟314對目標電話號碼施加一第二中斷視窗。舉例而言,第二中斷視窗可針對接通撥打目標電話號碼施加一60分鐘限制。若符合限制F,則在步驟316將目標電話號碼加至黑名單。應注意,雖然所示步驟310、314、及316中的限制對於由步驟302及304出發之二平行路徑皆相同,對於任何或所有不同限制條件可施加不同之限制。A path below step 304 is performed, and a first type of limit D is evaluated at step 318. For example, limit D can be set to track whether the target phone number has been dialed 30 times within 3 minutes. If the limit D is not met, the process continues and the page interface user is replied to at step 224. However, if the limit D has been met, then at step 320 the process will also evaluate the limit E. For example, limit E can be set to track whether the target phone number has been dialed 50 times within 5 minutes. If the limit E is not met, then a first outage period is applied to the target phone number at step 310, such as applying a 10 minute limit for the call to connect to the target phone number. If the limit E is met, then at step 322 the process can evaluate the limit F. For example, a limit F can be set to track whether the limit E for making a target call has exceeded 4 times within 24 hours. If not, a second interrupt window is applied to the target phone number in step 314. For example, the second interrupt window can impose a 60 minute limit on the call to the target phone number. If the limit F is met, the target phone number is added to the blacklist in step 316. It should be noted that although the limitations in steps 310, 314, and 316 are the same for both parallel paths initiated by steps 302 and 304, different limits may apply for any or all of the different constraints.

第7圖闡明另一種處理,其可用以識別一網頁介面使用者之一通話濫用形式。此第二種篩選器可追蹤網頁介面使用者無法回應使用者在步驟226輸入之電話號碼的回撥之情形。在步驟350,清單管理員72計算網頁介面使用者在步驟226無法回應回撥之次數。在步驟352,若超過設定之第一種限制,則在步驟354對網頁介面使用者之電話號碼施加一第一中斷時期。舉例而言,可將第一種限制設定為3次未回應通話,且將中斷時期設定為自第三次未回應通話起之30分鐘。若計數未超過預設之第一種限制,則處理繼續進行。在步驟356,一第二種限制可計算在某時期中超過第一種限制之次數。舉例而言,若在24小時之時期中將一相同網頁介面使用者中斷4次,則在步驟316可將網頁介面使用者之電話號碼加至黑名單,並加以永久限制。若未超過第二種限制,則在步驟358不會有進一步動作,因為在步驟354對網頁介面使用者之電話號碼施加了第一中斷時期。Figure 7 illustrates another process that can be used to identify a form of call abuse for a web interface user. This second type of filter can track the situation in which the web interface user cannot respond to the callback of the phone number entered by the user at step 226. At step 350, the inventory manager 72 calculates the number of times the web interface user was unable to respond to the callback at step 226. In step 352, if the first limit of the setting is exceeded, a first interruption period is applied to the phone number of the web interface user in step 354. For example, the first restriction can be set to 3 unanswered calls, and the interruption period is set to 30 minutes from the third unanswered call. If the count does not exceed the preset first limit, processing continues. At step 356, a second limit calculates the number of times the first limit is exceeded during a certain period of time. For example, if a user of the same web interface is interrupted 4 times during a 24-hour period, the phone number of the web interface user can be blacklisted and permanently restricted in step 316. If the second limit is not exceeded, then no further action is taken at step 358 because a first outage period is applied to the phone number of the web interface user at step 354.

應可輕易發現,能夠以多種準則為基礎實作各種篩選器。雖然此處以專屬於結構功能和/或方法動作之語言描述申請專利範圍標的物,可以理解,附隨申請專利範圍中界定之申請專利範圍標的物不必然限於上文揭露之特定功能或動作。反之,上述特定功能及動作僅為實作申請專利範圍之示範性形式。本發明之範圍應以附隨申請專利範圍界定之。It should be easy to find that various filters can be implemented based on a variety of criteria. Although the subject matter of the patent application is described herein in the language of the invention, the scope of the claims, the scope of the claims and the scope of the claims are not necessarily limited to the specific functions or actions disclosed. On the contrary, the specific functions and actions described above are merely exemplary forms of the scope of the patent application. The scope of the invention should be defined by the scope of the accompanying claims.

10、14...運算裝置10, 14. . . Arithmetic device

10a、14a...用戶端應用程式10a, 14a. . . Client application

10b、14b...VoIP應用程式10b, 14b. . . VoIP application

12...網際網路12. . . Internet

16...介面16. . . interface

18...電話網路18. . . Telephone network

20...電話20. . . phone

50...網頁50. . . Web page

60...服務提供者60. . . service provider

62...網頁伺服器62. . . Web server

64...資料庫64. . . database

70...管理服務70. . . Management service

72...清單管理員72. . . Inventory manager

84...通話超鏈結84. . . Call super link

90、90a、90b、90c、90d...廣告列表90, 90a, 90b, 90c, 90d. . . Ad list

92...較大篇幅廣告92. . . Larger size ad

100...運算環境系統100. . . Computing environment system

110...電腦110. . . computer

120...處理單元120. . . Processing unit

121...系統匯流排121. . . System bus

130...系統記憶體130. . . System memory

131...唯續記憶體131. . . Continuous memory

132...隨機存取記憶體132. . . Random access memory

133...基本輸入/輸出系統133. . . Basic input/output system

134...作業系統134. . . working system

135...應用程式135. . . application

136...其他程式模組136. . . Other program modules

137...程式資料137. . . Program data

140...非可移除非揮發性記憶體介面140. . . Non-removable non-volatile memory interface

141...硬碟機141. . . Hard disk drive

144...作業系統144. . . working system

145...應用程式145. . . application

146...其他程式模組146. . . Other program modules

147...程式資料147. . . Program data

150...可移除非揮發性記憶體介面150. . . Removable non-volatile memory interface

151...磁碟機151. . . Disk drive

152...可移除、非揮發性磁碟152. . . Removable, non-volatile disk

155...光碟機155. . . CD player

156...可移除、非揮發性光碟156. . . Removable, non-volatile disc

160...使用者輸入介面160. . . User input interface

161...滑鼠161. . . mouse

162...鍵盤162. . . keyboard

170...網路介面170. . . Network interface

171...區域網路171. . . Regional network

172...數據機172. . . Data machine

173...廣域網路173. . . Wide area network

180...遠端電腦180. . . Remote computer

181...記憶體儲存裝置181. . . Memory storage device

185...遠端應用程式185. . . Remote application

190...視訊介面190. . . Video interface

191...螢幕191. . . Screen

195...輸出周邊介面195. . . Output peripheral interface

196...印表機196. . . Printer

197...擴音器197. . . loudspeaker

第1圖為一區塊圖,闡明在一網路中提供語音通訊之一系統之一種具體實施例。Figure 1 is a block diagram illustrating a specific embodiment of a system for providing voice communication in a network.

第2圖為一區塊圖,闡明一傳統運算系統之一種具體實施例。Figure 2 is a block diagram illustrating a specific embodiment of a conventional computing system.

第3圖為一區塊圖,闡明第1圖之語音通訊系統之一更詳細具體實施例。Figure 3 is a block diagram illustrating a more detailed embodiment of the voice communication system of Figure 1.

第4圖為一實施例,闡明顯示搜尋結果之一網頁。Figure 4 is an embodiment illustrating a web page displaying search results.

第5圖為一流程圖,闡明以一通訊系統利用超鏈結之一處理的一種具體實施例。Figure 5 is a flow chart illustrating a specific embodiment of processing with one of the communication systems using a hyperlink.

第6圖為一流程圖,闡明第3圖之語音通訊系統回應對一網頁上之一超鏈結之選擇而執行之一處理的一種具體實施例。Figure 6 is a flow diagram illustrating one embodiment of the processing performed by the voice communication system of Figure 3 in response to selection of a hyperlink on a web page.

第7圖為一流程圖,闡明闡明第3圖之語音通訊系統回應對一網頁上之一超鏈結之選擇而執行之一處理的另一種具體實施例。Figure 7 is a flow diagram illustrating another embodiment of the processing of the speech communication system of Figure 3 in response to the selection of one of the hyperlinks on a web page.

10、14...運算裝置10, 14. . . Arithmetic device

12...網際網路12. . . Internet

16...介面16. . . interface

18...電話網路18. . . Telephone network

20...電話20. . . phone

Claims (20)

一種在一運算裝置及一電話間建立語音通訊之方法,該方法包含以下步驟:對一運算裝置提供一使用者介面,該使用者介面包含對與一零售商關聯之一目標電話號碼的一鏈結;接收來自該運算裝置之對於該鏈結的一選擇,該選擇識別與該零售商關聯之該目標電話號碼;接收與該運算裝置之一使用者關聯之一使用者電話號碼;針對該使用者電話號碼及該目標電話號碼之至少一者評估濫用準則,該等濫用準則包含第一濫用準則,該第一濫用準則用於計算回撥該使用者電話號碼導致未回應回撥之次數;回應於滿足該第一濫用準則,通訊傳遞一錯誤訊息至該運算裝置,且若在一時間期間內多於一個中斷(blackout)時期被施加在該目標電話號碼或該使用者電話號碼上,則預先排除該目標電話號碼與該使用者電話號碼之間的一語音連線;以及回應於未滿足該濫用準則,藉由回撥該使用者電話號碼,而建立該目標電話號碼與該使用者電話號碼之間的該語音連線。 A method of establishing voice communication between an computing device and a telephone, the method comprising the steps of: providing a computing device with a user interface, the user interface including one of a target telephone number associated with a retailer a link; receiving a selection from the computing device for the link, the selection identifying the target phone number associated with the retailer; receiving a user phone number associated with a user of the computing device; The at least one of the user's phone number and the target phone number evaluates the abuse criteria, and the abuse criteria include a first abuse criterion for calculating the number of times the callback of the user's phone number results in a non-response callback; In response to satisfying the first abuse criterion, the communication delivers an error message to the computing device, and if more than one blackout period is applied to the target phone number or the user's phone number during a time period, then Pre-excluding a voice connection between the target phone number and the user's phone number; and responding to the failure to meet the abuse criteria Then, the voice connection between the target telephone number and the user's telephone number is established by dialing back the user's telephone number. 如申請專利範圍第1項所述之方法,其中該評估步驟包 括針對二種電話號碼評估該等濫用準則。 The method of claim 1, wherein the evaluation step package This includes evaluating these abuse criteria for two phone numbers. 如申請專利範圍第1項所述之方法,其中該鏈結為在一第一網頁中之一超鏈結,該超鏈結為該語音連線識別該目標電話號碼,且該語音連線為一VoIP連線。 The method of claim 1, wherein the link is a hyperlink in a first webpage, the hyperlink is used to identify the target phone number, and the voice connection is A VoIP connection. 如申請專利範圍第1項所述之方法,其中該評估步驟包括以下步驟:對該回撥步驟導致該使用者電話號碼未回應回撥之該次數設定一第一限制,且若該計數超過該第一限制,則在一第一中斷時期內預先排除該語音連線。 The method of claim 1, wherein the evaluating step comprises the step of: setting a first limit to the number of times the callback step causes the user's phone number not to respond to the callback, and if the count exceeds the In the first limitation, the voice connection is pre-excluded during a first interruption period. 如申請專利範圍第4項所述之方法,其中該評估步驟包括以下步驟:對該回撥步驟導致該使用者電話號碼未回應回撥之該次數設定一第二限制,且若該計數超過該第二限制,則在一第二中斷時期內預先排除該語音連線,其中該第二限制大於該第一限制且該第二中斷時期大於該第一中斷時期。 The method of claim 4, wherein the evaluating step comprises the step of: setting a second limit to the number of times the callback step causes the user's phone number not to respond to the callback, and if the count exceeds the In a second limitation, the voice connection is pre-excluded during a second interruption period, wherein the second limit is greater than the first limit and the second interruption period is greater than the first interruption period. 如申請專利範圍第5項所述之方法,其中該評估步驟包括以下步驟:若在24小時內已對該使用者電話號碼施加了多於一個第一中斷時期至少兩次,則無限期地預先排除該語音連線。 The method of claim 5, wherein the evaluating step comprises the step of: indefinitely pre-arranging if more than one first interruption period has been applied to the user's telephone number at least twice within 24 hours Exclude the voice connection. 如申請專利範圍第1項所述之方法,其中該等濫用準則包含第二濫用準則,該第二濫用準則用於計算一已撥叫該目標電話號碼之次數。 The method of claim 1, wherein the abuse criterion comprises a second abuse criterion, the second abuse criterion being used to calculate a number of times the target telephone number has been dialed. 如申請專利範圍第7項所述之方法,其中該評估步驟包括以下步驟:對在一第一時期內可撥叫該目標電話號碼之次數設定一第一限制,且若該計數在該第一時期內超過該第一限制,則在一第一中斷時期內預先排除該語音連線。 The method of claim 7, wherein the evaluating step comprises the step of: setting a first limit on the number of times the target telephone number can be dialed in a first period, and if the count is in the first period Exceeding the first limit, the voice connection is pre-excluded during a first interruption period. 如申請專利範圍第8項所述之方法,其中該評估步驟包括以下步驟:對在一第二時期內可撥叫該目標電話號碼之次數設定一第二限制,且若該計數在該第二時期內超過該第二限制,則在一第二中斷時期內預先排除該語音連線。 The method of claim 8, wherein the evaluating step comprises the step of: setting a second limit on the number of times the target telephone number can be dialed in a second period, and if the count is in the second If the second limit is exceeded during the period, the voice connection is pre-excluded during a second interruption period. 如申請專利範圍第9項所述之方法,其中該評估步驟包括以下步驟:若在24小時內已對該目標電話號碼施加了多於一個第二中斷時期至少兩次,則無限期地預先排除該語音連線。 The method of claim 9, wherein the evaluating step comprises the step of pre-excluding indefinitely if at least two second interruption periods have been applied to the target telephone number at least twice within 24 hours. The voice is connected. 如申請專利範圍第7項所述之方法,其中該評估步驟包括以下步驟:回應於滿足該第二濫用準則,通訊傳遞一錯誤訊息至該運算裝置,且若在一時間期間內多於一個中斷時期被施 加在該目標電話號碼上,則預先排除該目標電話號碼與該使用者電話號碼之間的該語音連線;以及回應於未滿足該第二濫用準則,回撥該使用者電話號碼,且若該使用者回應該回撥,則建立該目標電話號碼與該使用者電話號碼之間的該語音連線。 The method of claim 7, wherein the evaluating step comprises the step of: communicating an error message to the computing device in response to satisfying the second abuse criterion, and if there is more than one interruption in a time period Time being applied Adding to the target phone number, pre-excluding the voice connection between the target phone number and the user phone number; and responding to the second abuse criterion, calling back the user phone number, and if The user should return the callback, and the voice connection between the target phone number and the user's phone number is established. 如申請專利範圍第1項所述之方法,其中該評估步驟包括以下步驟:對該回撥導致該使用者電話號碼未回應回撥之次數設定一第一限制,且若該計數超過該第一限制,則在一第一中斷時期內預先排除該語音連線,且其中該評估步驟更包括以下步驟:對在一第一時期內可撥叫該目標電話號碼之次數設定一第二限制,且若該計數在該第一時期內超過該第二限制,則在一第二中斷時期內預先排除該語音連線。 The method of claim 1, wherein the evaluating step comprises the step of: setting a first limit on the number of times the callback causes the user phone number not to respond to the callback, and if the count exceeds the first Limiting, the voice connection is pre-excluded in a first interruption period, and wherein the evaluating step further comprises the step of: setting a second limit on the number of times the target telephone number can be dialed in a first period, and if The count exceeds the second limit during the first period, and the voice connection is pre-excluded during a second interruption period. 一種透過一網路在一第一通訊裝置及一第二通訊裝置間建立語音通訊之方法,該方法包含以下步驟:從該第一通訊裝置接收對於一鏈結的一選擇,該選擇識別與該第二通訊裝置關聯之一第二電話號碼,該第二通訊裝置與一零售商關聯;接收與該第一通訊裝置關聯之一第一電話號碼;對該第一電話號碼及該第二電話號碼建立濫用準則,該等濫用準則包含第一濫用準則,該第一濫用準則用於計 算回撥該第一電話號碼導致未回應回撥之次數;回應於滿足該第一濫用準則,通訊傳遞一錯誤訊息至該第一通訊裝置,且若在一時間期間內多於一個中斷(blackout)時期被施加在該第一電話號碼或該第二電話號碼上,則預先排除該第一通訊裝置與該第二通訊裝置之間的一語音連線;以及回應於未滿足該第一濫用準則,藉由回撥該第一電話號碼,而建立該第一通訊裝置及該第二通訊裝置之間的該語音連線。 A method of establishing voice communication between a first communication device and a second communication device over a network, the method comprising the steps of: receiving a selection for a link from the first communication device, the selection identifying The second communication device is associated with a second telephone number, the second communication device is associated with a retailer; receiving a first telephone number associated with the first communication device; the first telephone number and the second telephone Numbers establish abuse criteria, which include a first abuse criterion, which is used to calculate Counting the number of times the first telephone number is returned without responding to the callback; in response to satisfying the first abuse criterion, the communication delivers an error message to the first communication device, and if there is more than one interruption during a time period (blackout a period of time being applied to the first telephone number or the second telephone number, precluding a voice connection between the first communication device and the second communication device; and responding to the failure to satisfy the first abuse criterion And establishing the voice connection between the first communication device and the second communication device by calling back the first phone number. 如申請專利範圍第13項所述之方法,其中該建立濫用準則之步驟定義第二濫用準則,該第二濫用準則用於計算在一時期內已經撥打該第二電話號碼之次數。 The method of claim 13, wherein the step of establishing an abuse criterion defines a second abuse criterion for calculating the number of times the second telephone number has been dialed during a period. 如申請專利範圍第14項所述之方法,其中該建立步驟包括以下步驟:回應於滿足該第二濫用準則,若在一時間期間內至少一個中斷時期被施加在該第二電話號碼上,則預先排除該第一通訊裝置與該第二通訊裝置之間的該語音連線;以及回應於未滿足該第二濫用準則,回撥該第一電話號碼,且若該回撥該第一電話號碼導致一經回應撥號,則建立該第一通訊裝置與該第二通訊裝置之間的該語音連線。 The method of claim 14, wherein the establishing step comprises the step of: in response to satisfying the second abuse criterion, if at least one interruption period is applied to the second telephone number during a time period, Pre-excluding the voice connection between the first communication device and the second communication device; and in response to not meeting the second abuse criterion, dialing back the first phone number, and if the call back the first phone number The voice connection between the first communication device and the second communication device is established as soon as the response is dialed. 一種在一第一電話號碼及一第二電話號碼間建立語音通訊之方法,該方法包含以下步驟:從一VoIP裝置處接收一要求以將該第一電話號碼連線至該第二電話號碼;對該第一電話號碼及該第二電話號碼之至少一者評估濫用準則,該等濫用準則包含第一濫用準則,該第一濫用準則用於計算回撥該第一電話號碼導致未回應回撥之次數;回應於滿足該第一濫用準則,若在一時間期間內多於一中斷(blackout)時期被施加在該第一電話號碼或該第二電話號碼上,則預先排除該第一電話號碼與該第二電話號碼之間的一語音連線;以及回應於未滿足該第一濫用準則,藉由回撥該第一電話號碼,將該第一電話號碼連線至該第二電話號碼。 A method of establishing voice communication between a first telephone number and a second telephone number, the method comprising the steps of: receiving a request from a VoIP device to connect the first telephone number to the second telephone number; An abuse criterion is evaluated for at least one of the first phone number and the second phone number, the abuse criteria including a first abuse criterion for calculating a callback of the first phone number resulting in a non-response callback The number of times; in response to satisfying the first abuse criterion, if more than one blackout period is applied to the first phone number or the second phone number during a time period, the first phone number is pre-excluded a voice connection with the second telephone number; and in response to the first abuse criterion not being met, the first telephone number is wired to the second telephone number by dialing back the first telephone number. 如申請專利範圍第16項所述之方法,該方法至少更包含以下步驟:若滿足該第一濫用準則,則在一中斷時期內預先排除該第一電話號碼至該第二電話號碼之連線。 The method of claim 16, wherein the method further comprises the step of: precluding the connection of the first telephone number to the second telephone number in an interruption period if the first abuse criterion is met . 如申請專利範圍第16項所述之方法,其中該評估濫用準則之步驟定義一第二濫用準則,該第二濫用準則計算在一時期內已撥叫該第二電話號碼之次數。 The method of claim 16, wherein the step of evaluating the abuse criterion defines a second abuse criterion that counts the number of times the second telephone number has been dialed during a period. 如申請專利範圍第18項所述之方法,該方法更包含以下步驟:若符合該第二濫用準則,則在一中斷時期內預先排除該第一電話號碼至該第二電話號碼之連線。 The method of claim 18, wherein the method further comprises the step of precluding the connection of the first telephone number to the second telephone number in an interruption period if the second abuse criterion is met. 如申請專利範圍第19項所述之方法,其中該評估步驟包括以下步驟:回應於滿足該第二濫用準則,若在一時間期間內多於一個中斷時期被施加在該第二電話號碼上,則預先排除該第一電話號碼與該第二電話號碼之間的該語音連線;以及回應於未滿足該第二濫用準則,回撥該第一電話號碼,且若該回撥該第一電話號碼導致一經回應撥號,則建立該第一電話號碼與該第二電話號碼之間的該語音連線。 The method of claim 19, wherein the evaluating step comprises the step of: in response to satisfying the second abuse criterion, if more than one interruption period is applied to the second telephone number during a time period, And pre-excluding the voice connection between the first phone number and the second phone number; and in response to not meeting the second abuse criterion, dialing the first phone number, and if the call back the first phone number The number causes the voice connection between the first telephone number and the second telephone number to be established upon response to dialing.
TW096132783A 2006-10-03 2007-09-03 Methods for establishing voice communication TWI450566B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/538,265 US8411833B2 (en) 2006-10-03 2006-10-03 Call abuse prevention for pay-per-call services

Publications (2)

Publication Number Publication Date
TW200824415A TW200824415A (en) 2008-06-01
TWI450566B true TWI450566B (en) 2014-08-21

Family

ID=39261230

Family Applications (1)

Application Number Title Priority Date Filing Date
TW096132783A TWI450566B (en) 2006-10-03 2007-09-03 Methods for establishing voice communication

Country Status (8)

Country Link
US (1) US8411833B2 (en)
EP (1) EP2055091B1 (en)
JP (1) JP5232790B2 (en)
KR (1) KR101429312B1 (en)
CN (1) CN101523884B (en)
RU (1) RU2452124C2 (en)
TW (1) TWI450566B (en)
WO (1) WO2008042574A1 (en)

Families Citing this family (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8918073B2 (en) 2002-03-28 2014-12-23 Telecommunication Systems, Inc. Wireless telecommunications location based services scheme selection
US8660573B2 (en) 2005-07-19 2014-02-25 Telecommunications Systems, Inc. Location service requests throttling
US8175939B2 (en) * 2005-10-28 2012-05-08 Microsoft Corporation Merchant powered click-to-call method
US9762623B1 (en) * 2005-12-22 2017-09-12 Apple Inc. Automatic call initiation in response to selecting tags in electronic documents and applications
US8208605B2 (en) 2006-05-04 2012-06-26 Telecommunication Systems, Inc. Extended efficient usage of emergency services keys
US8442862B2 (en) * 2006-11-14 2013-05-14 Marchex Sales, Inc. Method and system for tracking telephone calls
US9106704B2 (en) * 2007-01-18 2015-08-11 Yellowpages.Com Llc Systems and methods to provide connections via callback acceptance
US10089658B2 (en) * 2007-04-09 2018-10-02 Yellowpages.Com Llc Systems and methods to provide connections via callback acceptance cross-reference to related applications
TW200841697A (en) * 2007-04-13 2008-10-16 Crystal Bizview Llc Web-to-phone communication
US9413889B2 (en) * 2007-09-18 2016-08-09 Telecommunication Systems, Inc. House number normalization for master street address guide (MSAG) address matching
US8090622B2 (en) * 2007-09-21 2012-01-03 Microsoft Corporation Preferred items list management
US8576991B2 (en) 2008-03-19 2013-11-05 Telecommunication Systems, Inc. End-to-end logic tracing of complex call flows in a distributed call system
US7903587B2 (en) 2008-05-30 2011-03-08 Telecommunication Systems, Inc. Wireless emergency services protocols translator between ansi-41 and VoIP emergency services protocols
WO2010010060A2 (en) * 2008-07-21 2010-01-28 F-Secure Oyj Telephony fraud prevention
US20100046720A1 (en) * 2008-08-22 2010-02-25 Gerhard Geldenbott Point-in-poly routing for voice over internet protocol (VoIP) emergency calls with embedded geographic location information
US8630393B2 (en) 2010-07-27 2014-01-14 Marchex, Inc. System and method for blocking telephone calls
US8688087B2 (en) 2010-12-17 2014-04-01 Telecommunication Systems, Inc. N-dimensional affinity confluencer
US8503636B1 (en) * 2011-04-29 2013-08-06 Symantec Corporation Systems and methods for blocking an outgoing request associated with an outgoing telephone number
US9042556B2 (en) 2011-07-19 2015-05-26 Sonos, Inc Shaping sound responsive to speaker orientation
US10498889B2 (en) * 2011-09-16 2019-12-03 Skype Advertisement funded telephone calls
ITTO20110858A1 (en) * 2011-09-26 2013-03-27 Messagenet S P A METHOD AND SYSTEM FOR COMMUNICATION MANAGEMENT BETWEEN TWO USERS
WO2013048551A1 (en) * 2011-09-30 2013-04-04 Telecommunication Systems, Inc. Unique global identifier for minimizing prank 911 calls
CN103136236B (en) * 2011-11-28 2017-05-17 深圳市世纪光速信息技术有限公司 Method and system of information search
US9264537B2 (en) 2011-12-05 2016-02-16 Telecommunication Systems, Inc. Special emergency call treatment based on the caller
US10079931B2 (en) 2012-07-09 2018-09-18 Eturi Corp. Information throttle that enforces policies for workplace use of electronic devices
US9887887B2 (en) 2012-07-09 2018-02-06 Eturi Corp. Information throttle based on compliance with electronic communication rules
US8706872B2 (en) * 2012-07-09 2014-04-22 Parentsware, Llc Agreement compliance controlled information throttle
US9847948B2 (en) 2012-07-09 2017-12-19 Eturi Corp. Schedule and location responsive agreement compliance controlled device throttle
US9854393B2 (en) 2012-07-09 2017-12-26 Eturi Corp. Partial information throttle based on compliance with an agreement
US9313638B2 (en) 2012-08-15 2016-04-12 Telecommunication Systems, Inc. Device independent caller data access for emergency calls
KR101913733B1 (en) * 2012-11-01 2018-10-31 삼성전자주식회사 System and method for protecting private information by using nfc tag
US9374446B2 (en) * 2013-05-15 2016-06-21 Microsoft Technology Licensing, Llc Web platform with select-to-call functionality
US9641663B2 (en) 2013-05-15 2017-05-02 Microsoft Technology Licensing, Llc Reverse number look up
US10600081B2 (en) * 2013-08-15 2020-03-24 Spanish Quotes, Inc. Methods and systems for detecting fraudulent advertisements in pay-per-call advertising
US9954905B2 (en) * 2014-01-14 2018-04-24 Avaya Inc. Intelligent/selective coverage mechanism
CN103986746A (en) * 2014-04-14 2014-08-13 北京百度网讯科技有限公司 Method and device enabling user to establish communication with third party
US9774726B1 (en) 2016-12-22 2017-09-26 Microsoft Technology Licensing, Llc Detecting and preventing fraud and abuse in real time
CN108418976A (en) * 2017-02-10 2018-08-17 中国移动通信集团河南有限公司 Callback service monitoring method and system
US10810510B2 (en) 2017-02-17 2020-10-20 International Business Machines Corporation Conversation and context aware fraud and abuse prevention agent
US10102868B2 (en) 2017-02-17 2018-10-16 International Business Machines Corporation Bot-based honeypot poison resilient data collection
US10757058B2 (en) 2017-02-17 2020-08-25 International Business Machines Corporation Outgoing communication scam prevention
US10798126B2 (en) 2018-06-01 2020-10-06 Bank Of America Corporation Alternate display generation based on user identification
US10785220B2 (en) 2018-06-01 2020-09-22 Bank Of America Corporation Alternate user communication routing
US10972472B2 (en) 2018-06-01 2021-04-06 Bank Of America Corporation Alternate user communication routing utilizing a unique user identification
US10785214B2 (en) 2018-06-01 2020-09-22 Bank Of America Corporation Alternate user communication routing for a one-time credential
US10855666B2 (en) 2018-06-01 2020-12-01 Bank Of America Corporation Alternate user communication handling based on user identification
US10440063B1 (en) 2018-07-10 2019-10-08 Eturi Corp. Media device content review and management

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040165707A1 (en) * 2001-11-07 2004-08-26 Raymond Philip R. System and method for discouraging communications considered undesirable by recipients

Family Cites Families (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5222120A (en) 1990-04-23 1993-06-22 Mci Communications Corporation Long distance telephone switching system with enhanced subscriber services
US5524145A (en) * 1995-04-06 1996-06-04 Bell Atlantic Network Services, Inc. Incoming call completion threshold restriction
US5839063A (en) * 1995-09-01 1998-11-17 Lucent Technologies Inc. Authentication system and method for preventing wireless communication fraud
US6324264B1 (en) 1996-03-15 2001-11-27 Telstra Corporation Limited Method of establishing a communications call
US7593870B2 (en) 1996-08-21 2009-09-22 Reza Jalili Method for telephone-based authenticated authorization of transactions
JPH10224479A (en) 1997-02-04 1998-08-21 Fujitsu Ltd Call monitoring device
US6430286B1 (en) 1997-04-22 2002-08-06 At&T Corp Service and information management system for a telecommunications network
US6393113B1 (en) 1997-06-20 2002-05-21 Tekno Industries, Inc. Means for and methods of detecting fraud, lack of credit, and the like from the SS# 7 system network
US6393015B1 (en) 1997-09-12 2002-05-21 Genesys Telecommunications Laboratories, Inc. Method and apparatus for automatic network connection between a small business and a client
US6337858B1 (en) 1997-10-10 2002-01-08 Nortel Networks Limited Method and apparatus for originating voice calls from a data network
US6185194B1 (en) 1997-12-12 2001-02-06 Zip2 System and method for initiating a telephone call utilizing internet initiation
US6163604A (en) 1998-04-03 2000-12-19 Lucent Technologies Automated fraud management in transaction-based networks
US6236722B1 (en) * 1998-05-01 2001-05-22 Bell Canada Method and system for using TCAP signaling for improved call setup from a virtual switching point
US6356755B1 (en) 1998-12-22 2002-03-12 Ericsson Inc. Methods and arrangements for controlling re-registration of a mobile communications station based on satellite call optimization
US6707811B2 (en) 1999-03-19 2004-03-16 Estara, Inc. Internet telephony for ecommerce
US6418212B1 (en) 1999-12-09 2002-07-09 Mci Worldcom, Inc. Telephone fraud detection and prevention
US6516056B1 (en) 2000-01-07 2003-02-04 Vesta Corporation Fraud prevention system and method
US7050426B2 (en) 2000-03-29 2006-05-23 Edgeaccess, Inc. Method and system for routing calls from a standard telephone device to a voice over internet protocol network
US6862572B1 (en) 2000-04-21 2005-03-01 De Sylva Robert F. System and method for facilitating interaction between businesses, delivery agents, and customers
US6850606B2 (en) 2001-09-25 2005-02-01 Fair Isaac Corporation Self-learning real-time prioritization of telecommunication fraud control actions
US6873968B2 (en) 2001-02-10 2005-03-29 International Business Machines Corporation System, method and computer program product for on-line real-time price comparison and adjustment within a detachable virtual shopping cart
US20020164006A1 (en) 2001-05-04 2002-11-07 Weiss Lewis E. Electronic document call back system
US6801607B1 (en) 2001-05-08 2004-10-05 Mci, Inc. System and method for preventing fraudulent calls using a common billing number
US7369535B2 (en) 2001-06-11 2008-05-06 Level 3 Communications, Llc Voice over Internet Protocol real time protocol routing
US8402088B2 (en) 2001-06-11 2013-03-19 Apple Inc. Establishing telephone calls at a specified future time using a URI and a web-based telephony application
US7315518B1 (en) * 2002-09-05 2008-01-01 Art Technology Group, Inc. Method and apparatus for the prevention of unwanted calls in a callback system
US7372848B2 (en) 2002-10-11 2008-05-13 Agilent Technologies, Inc. Dynamically controlled packet filtering with correlation to signaling protocols
US20040120484A1 (en) 2002-12-20 2004-06-24 J. M. Buzbee Family Limited Partnership Telephonic interface for a visual presentation of a hierarchy of menus and automated call-back
IL154992A0 (en) 2003-03-19 2003-10-31 Yaron Mayer System and method for automatic selection of a good buy in price-comparison sites when the user buys more than one product at the same time
CN100485603C (en) 2003-04-04 2009-05-06 雅虎公司 Systems and methods for generating concept units from search queries
US7120235B2 (en) 2003-10-06 2006-10-10 Ingenio, Inc. Method and apparatus to provide pay-per-call performance based advertising
US8121898B2 (en) 2003-10-06 2012-02-21 Utbk, Inc. Methods and apparatuses for geographic area selections in pay-per-call advertisement
US7428497B2 (en) 2003-10-06 2008-09-23 Utbk, Inc. Methods and apparatuses for pay-per-call advertising in mobile/wireless applications
JP4349100B2 (en) 2003-11-21 2009-10-21 沖電気工業株式会社 Voice communication system and management server
US7453993B2 (en) 2003-12-16 2008-11-18 Alcatel Lucent Apparatus and method for a world wide web-based directory with automatic call capability
US20060074760A1 (en) 2004-09-21 2006-04-06 Helin Calvin D System and method for calling and communication based on search engine
EP1815413A4 (en) 2004-11-09 2009-10-21 Mobile Phone Applic Inc System and method for providing content to a mobile communication device
US20060188081A1 (en) 2005-02-18 2006-08-24 Murray Hooper Systems and methods for call measurement
US20070041523A1 (en) * 2005-08-16 2007-02-22 Sbc Knowledge Ventures Lp Method for identifying and responding to chronic callers in an interactive voice response system
US8081747B2 (en) * 2005-08-29 2011-12-20 At&T Intellectual Property I, Lp System and method of managing telephone calls within a voice over internet protocol telephone system
US8175939B2 (en) 2005-10-28 2012-05-08 Microsoft Corporation Merchant powered click-to-call method
US9183559B2 (en) 2006-01-10 2015-11-10 Yellowpages.Com Llc Systems and methods to convert a call generated from an advertisement

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040165707A1 (en) * 2001-11-07 2004-08-26 Raymond Philip R. System and method for discouraging communications considered undesirable by recipients

Also Published As

Publication number Publication date
US20080080691A1 (en) 2008-04-03
RU2452124C2 (en) 2012-05-27
US8411833B2 (en) 2013-04-02
WO2008042574A1 (en) 2008-04-10
CN101523884B (en) 2012-06-06
CN101523884A (en) 2009-09-02
EP2055091A4 (en) 2011-12-07
KR20090057995A (en) 2009-06-08
TW200824415A (en) 2008-06-01
KR101429312B1 (en) 2014-08-11
RU2009112209A (en) 2010-10-10
EP2055091B1 (en) 2017-12-06
JP2010506498A (en) 2010-02-25
EP2055091A1 (en) 2009-05-06
JP5232790B2 (en) 2013-07-10

Similar Documents

Publication Publication Date Title
TWI450566B (en) Methods for establishing voice communication
US9836767B2 (en) Systems and methods to facilitate real time communications and commerce via answers to questions
US8175939B2 (en) Merchant powered click-to-call method
CA2683555C (en) Systems and methods to facilitate searches via social network
US9787728B2 (en) Systems and methods to connect members of a social network for real time communication
US9100359B2 (en) Systems and methods to facilitate real time communications between members of a social network
US10147099B2 (en) Systems and methods to dynamically generate listings to selectively track user responses
CN101287046A (en) Communication connection method
Junge Consumer privacy issues get attention at Legislature

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees